Data at Risk: Super Scary Facts

These facts aren't for the faint of heart, so leave a light on while you learn about the dangers faced by data in the wild.

The use of mobile devices, such as laptops, also puts corporate data at risk. Squaretrade found that one laptop is stolen every 53 seconds, and over its lifetime, one in 10 laptops is either stolen or lost. This is particularly dangerous since 70 percent of corporate laptops are not encrypted and 90 percent do not have the ability to remotely wipe the laptops. Given the amount data stored on laptops, more than half of the stolen laptops result in a data breach.

Data at Risk: Super Scary Facts

The use of mobile devices, such as laptops, also puts corporate data at risk. Squaretrade found that one laptop is stolen every 53 seconds, and over its lifetime, one in 10 laptops is either stolen or lost. This is particularly dangerous since 70 percent of corporate laptops are not encrypted and 90 percent do not have the ability to remotely wipe the laptops. Given the amount data stored on laptops, more than half of the stolen laptops result in a data breach.

Organizations put a lot of effort into keeping data within their networks safe, using any of a number of endpoint protection systems and monitoring tools. Unfortunately, once outside the safety of the corporate firewall, corporate data is exposed to threats both seen and unseen. Today's workforce is on the move, working from remote locations almost as much as from a stationary office. To accommodate this fluidity of workplace, mobile devices are now carrying more sensitive corporate data than ever before, making them a prime access point for potential data breaches.

While organizations have been grappling with the complexities of BYOD, there's definitely plenty of room for improvement. The facts highlighted in this slideshow, provided by Druva, aren't for the faint of heart, so leave a light on while you learn about the dangers faced by data in the wild. And turning a blind eye won't make them go away.

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.